Unlock instant, AI-driven research and patent intelligence for your innovation.

Method, device, mobile terminal and readable storage medium for ensuring system safety

A system security and mobile terminal technology, applied in the field of system authority, can solve problems such as information security threats, and achieve the effect of information security guarantee

Active Publication Date: 2018-06-15
江苏信源达科技有限公司
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Aiming at the deficiencies in the prior art, the present invention provides a method, device, mobile terminal and readable storage medium for ensuring system security, so as to solve the defect in the prior art that the information security is threatened due to the system being ROOT

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method, device, mobile terminal and readable storage medium for ensuring system safety
  • Method, device, mobile terminal and readable storage medium for ensuring system safety
  • Method, device, mobile terminal and readable storage medium for ensuring system safety

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0053] image 3 A flowchart of one embodiment of a mode switching method is shown.

[0054] In step S201, a mode switching instruction from a short-range wireless communication terminal is received.

[0055] The mode switching command is sent by the short-range wireless communication terminal, and the mobile terminal has a communication function. In this embodiment, the mobile terminal has a short-distance wireless communication function. By establishing a communication connection with a short-distance wireless communication terminal, it receives the short-distance wireless communication terminal. Instructions for mode switching. Short-range communication can be realized by RF (radio frequency) function.

[0056] The short-range wireless communication mode is adopted between the mobile terminal and the source of the mode switching instruction, that is, the short-distance wireless communication terminal, and the switching of the scene mode is triggered by the short-distance w...

Embodiment 2

[0091] Figure 7 A block diagram of an embodiment of a mode switching device 300 is shown.

[0092] The mode switching device 300 includes: a communication module 310 , a detection module 320 , a mode switching module 330 , a writing module 340 and a storage module 350 .

[0093] The communication module 310 is used for acquiring a mode switching instruction of an external device. The detection module 320 is used for detecting whether the mode switching instruction received by the communication module 310 is valid. When the detection module 320 determines that mode switching is required, the mode switching module 330 enables the mobile terminal to switch to a corresponding scene mode. After the mode is switched, the writing module 340 writes the corresponding scene mode data into the storage module 350 .

[0094] Figure 8 A block diagram of one embodiment of a mode switching system 400 is shown.

[0095] This embodiment also provides a mode switching system 400 , includi...

Embodiment 3

[0106] The system authority of the mobile phone when it leaves the factory is ordinary user authority. Under this authority, the user cannot change or delete the mode and software of the mobile phone when it leaves the factory, so as to effectively prevent the intrusion of viruses and form a good management of the mobile phone system. For mobile phones used on special occasions, the information needs to be kept confidential, and therefore the permissions of the mobile phones need to be restricted to a certain extent.

[0107] Taking a prison as an example, when a judicial mobile phone is brought into the work area, the mobile phone will enter the police mode, and the use of various third-party applications on the mobile phone will be restricted, and the communication of the mobile phone will also be restricted to the numbers in the preset white list At this time, if the mobile phone is rooted, it will break through these restrictions and pose a threat to the information securit...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for ensuring system safety, which comprises detection system permission. When the system is detected to have administrator privileges, the ROOTED information is sent to a remote terminal and the computer is forced to shut down at the same time. The method for ensuring system safety adopts the dual measures of remote external terminal monitoring, management and self-management of system, which can not only guarantee the information security of the ROOTED system, but also manage the ROOTED system by adopting outside help in time.

Description

technical field [0001] The present invention relates to the field of system authority, in particular, to a method, device, mobile terminal and readable storage medium for ensuring system security. Background technique [0002] The ROOT user (super user) is the only administrator of the entire system and has the highest authority. In the Android system, once the ROOT permission is obtained, you can access and modify the entire system, such as reading, modifying, adding, deleting files, etc., and even customize your own system, uninstall pre-installed software, etc. [0003] This has various restrictions on the use of communication equipment for special occasions, such as restricting calls to non-group contacts and numbers outside the white list, restricting the use of some third-party software, etc. Some staff or criminals can root the terminal system, Thereby breaking through various prohibitions and posing a great threat to information security on specific occasions. Con...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/71H04M1/725H04M1/72463
CPCG06F21/71H04M1/72463H04M1/72454
Inventor 林忠伟张震朋赵磊周世忠
Owner 江苏信源达科技有限公司